Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

11

Empowerment
Technologies
Quarter 1–Module 2
Online Safety, Security, Ethics, and Etiquette

Development Team of the Module

Writer: Edlyn Ramos Dawis


Editor: Rolylyn H. Dado
Reviewer: Ann Marjorie V. Pico
Layout Artist: Froilan G. Isip

Management Team Zenia G. Mostoles EdD, CESO V, SDS


Leonardo C. Canlas EdD CESE, ASDS
Rowena T. Quiambao CESE, ASDS
Celia R. Lacanlale PhD, CID Chief
Arceli S. Lopez PhD, SGOD Chief
June D. Cunanan EPS- English
Ruby M. Jimenez PhD, EPS-LRMDS

Published by the Department of Education, Schools Division of Pampanga


Office Address: High School Boulevard, Brgy. Lourdes,
City of San Fernando, Pampanga
Telephone No: (045) 435-2728
E-mail Address: pampanga@deped.gov.ph
Introductory Message
For the Facilitator:

Welcome to the Empowerment Technologies Alternative Delivery Mode (ADM) Module


on Online Safety, Security, Ethics, and Etiquette.
This module was collaboratively designed, developed and reviewed by educators from
public institutions to assist you, the teacher or facilitator in helping the learners meet the
standards set by the K to 12 Curriculum while overcoming their personal, social, and
economic constraints in schooling.
This learning resource hopes to engage the learners into guided and independent
learning activities at their own pace and time. Furthermore, this also aims to help
learners acquire the needed 21st century skills while taking into consideration their
needs and circumstances.
As a facilitator you are expected to orient the learners on how to use this module. You
also need to keep track of the learners' progress while allowing them to manage their
own learning. Furthermore, you are expected to encourage and assist the learners as
they do the tasks included in the module.

For the Learner:


Welcome to the Empowerment Technologies Alternative Delivery Mode (ADM) Module
on Online Safety, Security, Ethics, and Etiquette.

In this phase of our country where a hacker outbreak increase unevenly every single
seconds, online security can no longer be taken lightly. Otherwise, your complete
individual personal information could be in danger. In order for us to secure information,
online security is designed to prevent credit card theft, or something as simple as you
using antivirus software to protect your device. We need to aware of the rules that are
followed and actions that are taken to make sure online user information and
confidentiality aren‟t negotiated by cybercriminals.
This module was designed to provide you with fun and meaningful opportunities for
guided and independent learning at your own pace and time. You will be enabled to
process the contents of the learning resource while being an active learner.
What I Need to Know

In this module will apply online safety, security, ethics, and etiquette standards and
practice in the use of ICTs as it would relate to their specific professional tracks will be
tackled.
It gives you the practice and safeguards that should be discerned when you are using
internet you need to ensure that the users as well their computers and personal data
are safe from crimes related in using the internet.
For the learner

Internet is defined as the info electronic networks. This means that any person has
access to these nets, where students can place info and can grab that info.

This topic introduces the learners to discern promising data and erroneous valued data.

At the end of this module, you are expected to:


1. describe the characteristic of online safety and security.
2. define the netiquette and enumerate tips on how to stay safe online.
3. apply online security and etiquette standards and practice in the use of ICTs as
it would relate to their specific professional tracks
What I Know

Directions: Read each item carefully, choose the letter of the correct answer and write
your answers in your notebook.

1. It is the knowledge of maximizing the user‟s personal safety and security risks on
private information and property associated with using internet and self-
protection from computer crime in general.
A. Measures
B. Online Safety
C. Online Threats
D. Safety Measures
2. It is an act performed by a knowledgeable computer user sometimes referred to
as hacker that illegally browses or steal someone„s information?
A. Online Ethics and Netiquette
B. Online Measures
C. Online Safety
D. Online Threats
3. It is refers to the right of the individuals to deny or restrict the collection and used
of information about them.
A. Computer Ethics
B. Confidentiality
C. Privacy
D. Phishing
4. It is a set of rules and norms for acceptable conduct or behavioral online.
A. Measures
B. Netiquette
B. Online Safety
D. Online Threats
5. This concerned with how computing professional should make decisions
regarding professional and social conduct.
A. Computer Ethics
B. Netiquette
C. Online Safety
D. Phishing
Apply online safety, security, ethics, and
Lesson
etiquette standards and practice in the use of
2 ICTs as it would relate to their specific
professional tracks.

On-line safety sometimes denoted to as digital safety, or cyber safety, Internet safety, is
a comparatively new concept that has full-grown with progresses in the Internet. On the other
hand , it includes some facets to Internet safety. Generally, the word refers to practices and
precautions you should observe when using the Internet, so as to guarantee that your personal
info and your computer remain safe.

What’s In

“Online Safety Word Scramble “


Direction: Unscramble the letters to find the word about digital safety.
1. ECYTRIS
2. EQNEETIUTT
3. ENONIL
4. NTITEENR MCAS
5. TFEAYS

What’s New

Online safety talks about the practices and precautious that should be observed when using the
internet to protect the users as well as their computers and personal info if there are safe from
the wrongdoings associated in using the internet. Numerous crimes that can be committed on
the internet; like stalking , identify theft , privacy violations and harrashment.

On the other hand ,online safety measures means never give any personal information about
yourself over the Internet . There is also an online threats which is an act performed by a
knowlegeable computer user sometimes reffered to as hacker that illegally browses or steal
someone‟s information. In this advancement, we have a lot of categories of threats that are
increasing in this world of scheme like phishing, pharming, internet scam , botnet ,malware,
virus and worm, bug, cyber staking, cyber bullying , cyber harrasment and spoofing.As a user
we must be aware of the online ethics and netiquette to maintain our privacy . Morever ,
netiquette is a set of rules and norms for acceptable conduct or behavioral online while
computer ethics is concerned with how computing professionals should make decisions
regarding professional and social conduct . We must consider to learn the terms like
authentication, user indentification , possessed object , biometric device, and callback system.

Key terms

Cyber- crime - a crime committed or assisted through the use of the Internet.
Privacy Policy/Terms of Services (ToS) - tells the user how the website will handle its data.
Malware - stands for malicious software.
Virus - a malicious program designed to transfer from one computer to another in any means
possible.
Worms - a malicious program designed to replicate itself and transfer from one file folder to
another and also transfer to other computers.
Trojan - a malicious program designed that is disguised as a useful program but once
downloaded or installed leaves your PC unprotected and allows hacker to get your
information.
Spyware - a program that runs in the background without you knowing it. It has the ability to
monitor what you are currently doing and typing through key logging.
Adware - a program designed to send you advertisement, mostly pop-ups.
Spam - unwanted email mostly from bots or advertisers.
Phishing - acquires sensitive personal information like passwords and credits card details.
Pharming - a more complicated way of phishing where it exploits the DNS system.
Copyright - a part of law, wherein you have the rights to work, anyone who uses it w/o your
consent is punishable by law.

Answer the following questions and write your answers in your notebook.

1. What is online safety? Safety measures? Online Threats?


2. How do we maintain our privacy?
3. What are the types of threats you have already encounter?
What is It

Discussion of Activity 1

Be Aware of ATTACK!

Directions: Identify and find the correct answer on the box and write your correct answer
on the separate sheets of paper.

Adware Denial of Service Attack Phishing Spyware Virus


Botnet Malware Spam Trojan Worm

1. It stands for malicious software.


2. It is a type of malware that automatically delivers advertisements.
3. It can copy itself and spread to other computers by attaching themselves to
programs and executing code when a user runs the infected program.
4. It is one of the most common types of malware, can spread over computer networks
by exploiting operating system vulnerabilities. It‟s a standalone program that
replicates itself to infect other computers, without requiring action from anyone.
5. It enters your system disguised as a normal, harmless file or program to trick users
into downloading and installing malware.
6. It is designed to track your browsing habits and internet activity. Spying capabilities
can include activity monitoring, collecting keystrokes, data harvesting of account
information, logins, and financial data, and more.
7. It is an unwanted email mostly from bots or advertisers. It can be used to send
malware.
8. It is an unwanted acquisition of sensitive personal information like passwords and
credit card details.
9. It is a group of compromised computer connected to a network (“zombie”).
10. It disrupts computer access to internet services.
What’s More
Independent Activity 1
Directions: Let us check how well you have learned about Online Safety by answering
the questions given. Write your answers in your notebook.

1. As a student, how do you secure your privacy while you are using the internet?
2. When using public computer terminal, what should we do?
3. What you must consider when you are downloading or installing software or
anything on your computer or cellphone that is unknown to you?

Independent Assessment 1
Directions: Read some network netiquette. Write Yes if you
are agree and No if you are disagree. Write your
answer on a separate sheet of paper.

1. Be aware on what you share online.


2. Just accept terms and conditions, read it.
3. Do not share your password with anyone.
4. Always add friends that you don‟t know in real life.
5. Post anything about a future plans for your trip and vacations.
6. Do not talk to strangers whether online or face –to- face.
7. Install and updates antivirus software on your computer.
8. Protect your information
9. Try to visits untrusted websites.
10. If you have Wi-Fi at Home, make it private by adding a password.

Independent Activity 2
“To stay safe online we must install and update
antivirus software on your computer.”

Directions: Guess and name the picture of the different kind


or brand of Anti- virus. Write your answer on your notebook.

1.______________ 2.___________ 3.______________


4.______________ 5._____________ 6._______________

Independent Assessment 2
Directions: Give your opinion or thoughts regarding the situation.
Write your answer on a separate sheet of paper.

1. As a SHS student, when somebody is posting a blog, using a


chat room, sending an instant message or sending an email to an online
acquaintance, what you will do to secure your privacy?
2. What are things you should do if someone sends you an email or IM that
discusses private information that makes you uncomfortable?
3. Why we should never meet an online acquaintance in an unfamiliar or strange
place?
4. Why we should seriously consider changing any information from time to time
that reveals too much about you?
5. Since COVID- 19 online selling are trending but as to online safety what we will
consider when shopping online?

Independent Activity 3
Directions: Design your own brochure. Prepare a one sheet of a band or art paper.

TASK
Create a brochure, telling students how to
stay safe online. Start with the outside pages
today:

Back page
Internet Safety
Front Page Must
Tips be eye catching
to make people
want to open the
brochure .tomak

Information about you


Independent Assessment 3
YOU ARE SAFE?

Directions: Check the items below if they properly describe


your online practices.

1. You never reveal my last name to online links.


2. You never reveal my address to online acquaintances.
3. You never divulge my phone number to online friends.
4. You never tell my usernames or passwords to online friends
5. Your username don‟t offer any clues to my identity.
6. You never sent my picture to an online acquaintance, and plan to.
7. You never met an online acquaintance in person, and don‟t plan to.
8. If you have an Instagram Facebook, Tweeter and any social network page like I
use a site that allows only known friends to access my page and I don‟t allow
anyone else to see it.

Notes: If you checked 7 or more items, you are safe. If you checked 5-6 items, you may be
placing yourself in danger. If you checked fewer than 5 items, you are unsafe. If you
checked fewer than 7 items, you should consider changing your online practices. In the
space below, state how you can improve your Internet safety.

What I Have Learned

Reflect on what you have learned after taking up the module by completing the chart
below (2-3 sentences). Write your answer on a separate sheet of paper.

What were your


thoughts or
ideas about
online safety?

What new or
additional ideas
did you learn
after taking up
this lesson?
What I Can Do

Directions: What are things you should do if you are in this scenario? Write your answer
on separate sheet paper.

Scenario: In your own experience, imagine if someone gained access to any of your
social media accounts they could change your account name, password and recovery
data in order to lock you out and take total control. They could even go as far as
pretending to be you and send out compromised messages to your contacts and this list
is endless really. To help you stay safe from hackers and protect your social media
accounts.

Assessment

Directions: Read each item carefully and choose the letter of the correct answer. Write
your answers on your notebook.

1. This concerned with how computing professional should make decisions regarding
professional and social conduct.
A. Computer Ethics
B. Netiquette
C. Online Safety
D. Phishing
2. It is the knowledge of maximizing the user‟s personal safety and security risks on
private information and property associated with using internet and self- protection
from computer crime in general.
A. Measures
B. Online Safety
C. Online Threats
D. Safety Measures
3. It is a set of rules and norms for acceptable conduct or behavioral online.
A. Measures
B. Netiquette
C. Online Safety
D. Online Threats
4. It is refers to the right of the individuals to deny or restrict the collection and used of
information about them.
A. Computer Ethics
B. Confidentiality
C. Privacy
D. Phishing
5. It is an act performed by a knowledgeable computer user sometimes referred to as
hacker that illegally browses or steal someone„s information?
A. Online Ethics and Netiquette
B. Online Measures
C. Online Safety
D. Online Threat
6. To be safe, social link sites;
A. You must require that you follow some precautions.
B. You should never be used.
C. You should require your registration.
D. You must post information.
7. One of the best ways to stay safe on a social network site is to:
A. choose a site that allows you to control who sees your page
B. give your information
C. post your picture
D. use an anonymous username
8. Social network sites allow you to:
A. make plans with your friends, make new friends, apply to colleges
B. make plans, make new friends, share your thoughts
C. post your picture.
D. share your thoughts, order pizza, keep track of friends
9. An important downside aspect of social network sites is that they are:
A. confusing for most people to use.
B. expensive.
C. using for looking for someone to acquaintance to meet other people.
D. where dangerous criminals may target victims.
10. Criminals who go on social network sites:
A. Are expert liars who know how to cultivate your trust.
B. Are making plans to make friends and share information.
C. Are often petty criminals who are not really dangerous.
D. Never disguise their identity.

Additional Activities

On a separate sheet of paper, write at least 100-150 words about your thoughts in the
“Data Privacy Act of 2012 REPUBLIC ACT NO. 10173An Act Protecting Individual
Personal Information In Information And Communications Systems In The
Government And The Private Sector, Creating For This Purpose A National
Privacy Commission, And For Other Purpose!”. Provide sound evidences to
strengthen your claim/s.
Independent Independent Activity 2 Assessment
Assessment 1 1. Norton A
B
YES 2. F-Secure
B
NO
3. SMADAV C
YES
D
NO
4. ESET NOD32 A
NO
D
YES 5. Kaspersky D
YES
B
YES 6. Bitfender C
NO
YES
What I Know What‟s New/ What‟s More/ What Is It?
B Independent Activity 3 Malware
D Adware
C Independent Assessment 3 Virus
B Worm
Independent Activity 3 Trojan
A
/What I have Learned/ Spyware
Spam
What Can I do? Phishing
Botnet
Denial Service
Attack
Additional Activity
1.Answers may vary
Answer Key
References

1. Internet safety." Definitions.net. STANDS4 LLC, 2020. Web. 25 Jun 2020.


2. <https://www.definitions.net/definition/internet+safety>.
3 http://novasexy1.blogspot.com/2017/03/lesson-2-online-safety-security-and.htm
4 aboutinternetsafety.blogspot.com/2013/04/definition-of-internet-safety.html
5. https://www.opencolleges.edu.au/informed/cyber-safety/
6. https://websitebuilders.com/how-to/lesson-plans/netiquette/
7. https://www.polk-fl.net/students/onlineresources/documents/6-8/PItfallsDangers.pdf

You might also like